CVE-2026-2168
Remote Command Injection in D-Link DWR-M921 LTE Upgrade Function
Publication date: 2026-02-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dlink | dwr-m921_firmware | 1.1.50 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-2168 is a critical command injection vulnerability found in the D-Link DWR-M921 router firmware version 1.1.50. The flaw exists in the function sub_419920 within the /boafrm/formLtefotaUpgradeQuectel endpoint. This function processes the input parameter fota_url, which is intended to contain a URL starting with "http://", "https://", or "ftp://". However, the input validation is insufficient and does not properly sanitize or filter special characters before using the input to construct a shell command via sprintf. This allows an attacker to inject arbitrary commands into the system shell, leading to command execution on the device.'}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited remotely by sending a specially crafted request to the vulnerable endpoint with a malicious fota_url parameter. The attack can be performed without user interaction and can execute commands with root privileges on the device.'}] [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary commands on the affected D-Link DWR-M921 router with root privileges. This can compromise the confidentiality, integrity, and availability of the device and the network it is connected to.
- Attackers can gain unauthorized control over the router.
- Sensitive information on the device or network may be exposed or altered.
- The router could be used as a foothold for further attacks within the network.
- Service disruption or denial of service could occur if malicious commands affect device operation.
Exploitation is considered easy, and a proof-of-concept exploit is publicly available, increasing the risk of attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to send crafted HTTP POST requests to the vulnerable endpoint `/boafrm/formLtefotaUpgradeQuectel` on the D-Link DWR-M921 router firmware version 1.1.50. The key is to test the `fota_url` parameter for command injection by including shell metacharacters after a valid protocol prefix such as "http://".'}, {'type': 'paragraph', 'content': 'A proof-of-concept approach involves authenticating to the router, then sending a POST request with a payload like `http://; ls -la` in the `fota_url` parameter to check if arbitrary commands can be executed.'}, {'type': 'paragraph', 'content': 'Example command using curl (assuming you have authenticated and have a valid session cookie):'}, {'type': 'list_item', 'content': 'curl -X POST -d "fota_url=http://; ls -la" http://<router-ip>/boafrm/formLtefotaUpgradeQuectel'}, {'type': 'paragraph', 'content': 'If the command injection is successful, the router will execute the injected command, which can be verified by observing the response or side effects.'}] [3]
What immediate steps should I take to mitigate this vulnerability?
There are no known fixes or patches available for this vulnerability as of the latest information.
Immediate mitigation steps include:
- Restrict remote access to the affected router to trusted networks only, preventing unauthorized external access.
- Disable or block access to the vulnerable endpoint `/boafrm/formLtefotaUpgradeQuectel` if possible via firewall rules or router configuration.
- Monitor network traffic for suspicious POST requests targeting the vulnerable endpoint.
- Consider replacing the affected device with a different model or vendor that is not vulnerable.